ESXI-65-000005 - The ESXi host must enforce the limit of three consecutive invalid logon attempts by a user.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

By limiting the number of failed login attempts, the risk of unauthorized access via user password guessing, otherwise known as brute-forcing, is reduced. Limits are imposed by locking the account.

Solution

From the vSphere Web Client select the ESXi Host and go to Configure >> System >> Advanced System Settings. Click Edit and select the Security.AccountLockFailures value and configure it to 3.

or

From a PowerCLI command prompt while connected to the ESXi host run the following command:

Get-VMHost | Get-AdvancedSetting -Name Security.AccountLockFailures | Set-AdvancedSetting -Value 3

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y21M10_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-7, CAT|II, CCI|CCI-000044, Rule-ID|SV-207606r378517_rule, STIG-ID|ESXI-65-000005, STIG-Legacy|SV-104043, STIG-Legacy|V-93957, Vuln-ID|V-207606

Plugin: VMware

Control ID: 73748b27b21b31a9d4f21916b5f4de58b5f55480cb1589fc4473b97ddb1e0812